insidejob
AML.T0072 Realized

Reverse Shell

This technique has been observed in real-world attacks on AI systems.

Adversaries may utilize a reverse shell to communicate and control the victim system.

Typically, a user uses a client to connect to a remote machine which is listening for connections. With a reverse shell, the adversary is listening for incoming connections initiated from the victim system.